19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index n C–C 859<br />

session management, liberal<br />

scope, 244–248<br />

XSS exploiting via, 475<br />

COPY method, 679<br />

count() function, 348<br />

credentials<br />

attackers, 171<br />

au<strong>the</strong>ntication vulnerability,<br />

169–171<br />

e-mail containing, 184<br />

hacker’s methodology,<br />

au<strong>the</strong>ntication<br />

autogenerated, 809–810<br />

unsafe distribution, 810–811<br />

unsafe transmission, 810<br />

incomplete validation, 180–181<br />

insecure distribution, 184<br />

insecure storage, 190–191<br />

secret handling of, 192–193<br />

strength, 192<br />

validation, 193–195<br />

<strong>web</strong> server and default,<br />

670–671<br />

hacker’s methodology, 846<br />

cross-domain data capture,<br />

515–516<br />

CSS injection, 517–519<br />

Firefox, 521<br />

HTML injection, 516–517<br />

JavaScript hijacking, 519–520<br />

E4X, 523–524<br />

function callbacks, 520<br />

JSON, 521<br />

preventing, 524<br />

variable assignment, 522<br />

proxy services, 529–531<br />

cross-domain requests<br />

JSON, 477<br />

XMLHttpRequest, 528–529<br />

XSS sending XML, 477–478<br />

/crossdomain.xml, 525–526<br />

cross-site request forgery (CSRF),<br />

8, 244, 504–511<br />

anti-CSRF tokens, 508–509,<br />

516–517<br />

XSS defeating, 510–511<br />

au<strong>the</strong>ntication, 507–508<br />

flaws<br />

exploiting, 506–507<br />

preventing, 508–510<br />

real-world, 505<br />

hacker’s methodology, 820<br />

session management, 251<br />

cross-site scripting (XSS), 8<br />

attack payloads, 443–447<br />

autocomplete, 446<br />

escalating client-side, 447<br />

escalation to o<strong>the</strong>r pages,<br />

473–474<br />

inducing actions, 445–446<br />

Trojan injection, 444–445<br />

trust relationship<br />

exploitation, 446–447<br />

virtual defacement, 443–444<br />

attackers, 251<br />

au<strong>the</strong>ntication, 473–474<br />

chaining, 450–451<br />

CSRF defeating anti-CSRF<br />

tokens with, 510–511<br />

database error messages, 620<br />

defense, 28<br />

delivery mechanisms, 447–451<br />

in-band, 449–450<br />

out-of-band, 450<br />

DOM-based, 440–442<br />

delivering, 448–449<br />

finding and exploiting,<br />

487–491<br />

input validation, 497<br />

output validation, 497–498<br />

preventing, 496–498<br />

reflected XSS converted into,<br />

472–473<br />

steps, 441<br />

escaping, 420<br />

exploits<br />

cookies, 475<br />

delivering, 473–481<br />

JavaScript executed within<br />

XML responses,<br />

478–479<br />

nonstandard request and<br />

response content,<br />

476–479<br />

Referrer header, 475–476<br />

XML requests sent crossdomain,<br />

477–478<br />

filters<br />

anti-, 452, 748<br />

blacklist-based, 451–452<br />

IE, 479–481<br />

<strong>web</strong> browsers, 479–481<br />

HTML tag pairs, 422<br />

IE filter, 479–481<br />

JavaScript, 436–438<br />

non-HTTP services, 562–563<br />

NULL bytes, 460<br />

POST request changed to GET<br />

request, 474–475<br />

prevalence, 432<br />

preventing, 492–498<br />

real-world, 442–443<br />

reflected, 434–438<br />

Apache, 442<br />

cookies, 437–438<br />

defensive filters, 455–456<br />

delivering, 448–449<br />

DOM XSS converted from,<br />

472–473<br />

exploiting, 435–438, 474<br />

finding and exploiting,<br />

452–481<br />

hacker’s methodology,<br />

829–830<br />

HTML limitations, 495–496<br />

IE, 435<br />

input insertion, 495<br />

input validation, 492–493<br />

length limits, 471–473<br />

output validation, 493–495<br />

preventing, 492–496<br />

“remember me” function, 437<br />

sanitizing filters, 468–471<br />

signature-based filters,<br />

455–456<br />

steps, 436–437<br />

stored XSS compared to,<br />

439–440<br />

user input testing, 453<br />

user input testing to<br />

introduce script,<br />

454–455<br />

security evolution, 433<br />

session token vulnerabilities,<br />

243–244<br />

source code, 704–705<br />

stored, 438–440<br />

attacker steps, 438–439<br />

delivering, 449–450<br />

e-mail testing, 483–484<br />

finding and exploiting,<br />

481–487<br />

HTML limitations, 495–496<br />

input insertion, 495<br />

input validation, 492–493<br />

MySpace, 442–443, 446<br />

output validation, 493–495<br />

preventing, 492–496<br />

reflected XSS compared to,<br />

439–440<br />

search function, 439<br />

uploaded files testing,<br />

484–487<br />

vulnerabilities<br />

identifying, 451–452<br />

low-risk, 451<br />

varieties, 433–442<br />

XSS Shell, 566<br />

cryptographic algorithms, 687<br />

CSRF. See cross-site request<br />

forgery

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!